1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
7

It’s illegal to hack into a system without authorization, but is it ethical for a gray-hat to hack into a system if the intent i

s to help it become more secure? Some experts consider gray-hat hackers an essential part of securing the Internet because they often expose vulnerabilities before they’re discovered by the security community. What do you consider the dividing line?
Computers and Technology
1 answer:
oksian1 [2.3K]3 years ago
8 0

Answer:

Some hackers are smart about there hacking .. others have a a plot but didnt test there theory

Explanation:

You might be interested in
Access Office Equipment has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of
AleksAgata [21]

Answer:

Access Office Equipment is implementing a growth strategy.

Explanation:

Growth strategy can be defined as the strategy whose goal is to win market shares in a greater quantity. The earnings in growth strategy might be short-termed. The common growth strategies include:

  • product expansion
  • market expansion
  • market penetration
  • acquisition and diversification

I hope it will help you!

4 0
3 years ago
Is a book considered technology?
kumpel [21]
Yes, "technology" doesn't have to be all about computers or cell phones.. Technology is anything that is a new advance in knowledge and books were once a great advance in that field.
7 0
4 years ago
Read 2 more answers
What are the Positive and negative sites of the internet
Lynna [10]

Answer:

A positive of the sites of internet is that it can be very helpful to you like brainly. It can also educate you and help when you cant do you something like we have online classes since we can't go to school because of Corona

A negative of the sites of the internet is that sometimes people will try to trick you to do irresponsible things. Some will trick you for your address, credit card number, or using things unwisely. Because people don't know who is behind the screen they might be a criminal but they also don't know who you are until they get your address or information.

Explanation:

8 0
3 years ago
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simul
Soloha48 [4]

Answer:

Mainframe Computer is capable of doing all the functions which are listed in question.

Explanation:

A mainframe is a very large general-purpose computer (usually costing millions of dollars) that is capable of performing very many simultaneous functions, supporting very many simultaneous users, and storing huge amounts of data. A microcomputer is the type of computer you use.

3 0
3 years ago
Matthew is working to select an authentication method for his company that will support REST as well as many web-based and mobil
vitfil [10]

Answer:

C) OpenID Connect

Explanation:

The best option is OpenID Connect because is based in OAuth, and supports multiple web based and mobile clients, and supports REST.

With OAuth, we cannot make any user authentication just provide a token to access data.

RADIUS is a networking protocol, and Shibboleth is a single sign-on log-in system for computer networks and the Internet, both not support REST.

6 0
3 years ago
Other questions:
  • Consider the following method.
    13·1 answer
  • What file would you edit to restrict the number of simultaneous logins a user can employ??
    14·1 answer
  • Which of the following information is most important to include in a timeline?
    14·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • Which zone of the ocean is deepest ?
    7·2 answers
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • Why Stockholder are interested in the way a company operate?
    12·1 answer
  • You received an email message stating that your mother's bank account is going to be forfeited if you do not respond to the emai
    6·1 answer
  • What does advance mean​
    6·1 answer
  • 1.Microsoft Word is a/an ........​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!